19
1 Running Head: PORTRIAT OF CYBER SEXUAL PREDATOR Portrait of a Cyber Sexual Predator Donna L. LaPalm Regis University

Portrait of a Cyber Sexual Predator

Embed Size (px)

Citation preview

1Running Head: PORTRIAT OF CYBER SEXUAL PREDATOR

Portrait of a Cyber Sexual Predator

Donna L. LaPalm

Regis University

2PORTRAIT OF A CYBER SEXUAL PREDATOR

Pedophiles and Hebophiles Online

The proceeding material depicts the characteristics of an online sexual predator, both in

criminological theory, and diagnostically. The male, or female that perpetrates these crimes against the

victim which in this case is a child—both prepubescent, and through adolescence is the topic of this

expose. Cyber space is not only a measure in which they gain control over their victims, it is frequently

what further perpetuates their very dangerous, and lethal behaviors which are directed at our children.

Variances in methods are being utilized to achieve what they came trolling the information

super highway for: sex with minors. These criminals come in droves, and they support, and assist one

another in their deviate endeavors. More often than not—these individuals or groups feel entitled to

their privacy, even with their crimes against children being perpetrated Their amendment rights are just

as palpable for them, as they are for you and I—non cyber world criminals is what is within their

reasoning.

First Amendment Rights

“Congress shall make no law respecting an establishment of religion, or prohibiting the free

exercise thereof, or abridging the freedom of speech, or of the press” (Hickey, 2008, p. 160). “In spite of

these valiant declarations, there have always been restraints on speech and writing with both practical

and legal supports” (Hickey, 2008, p. 160). However, the first amendment does not allow someone to

shout fire in a crowded theatre” in order to wreak havoc on the unsuspected victim (Hickey, 2008; p

161). Ergo, the necessity for this portion of the introduction ; perpetrators of deviate sexual behavior

online believe or even proclaim that their amendment rights are being hampered by these legal sanction

against them viewing, trading, or posting n regards to child pornography or any forum as it relates to

this crime.

3PORTRAIT OF A CYBER SEXUAL PREDATOR

So what does the individual behind the keyboard look like, or dress like? Is he or she a green

fang toothed monster, or a red devil with a pitch fork and a tail? He or she is quite the opposite of

cartoonish depictions of this evil that is perpetrated online.

He, or she can be as normal as you or I—or as strange as one can fantasize about the in the dark

corners of one’s mind. They are newspaper carriers, the elderly, they are younger, they are the society’s

lowly … they are bankers, candle stick makers, beggars and thieves. Either gender can be a cybercriminal

in this manner, although the male population is most common. Variances in age, race, creed, and

faith/religious denomination occur with these cybercriminals (Hickey, 2008).

Paraphilias: Pedophilia and Hebephilia

The American Psychiatric Association [(APA)] (2000) cite the following as it concerns paraphilic

disorders: they are recurrent, intense sexually arousing fantasies, urges, or behaviors generally 1)

involving nonhuman objects, 2) suffering or humiliation of oneself, or a partner, 3) child or

nonconsenting persons-that occur for over a period of six months (APA, 2000).

Pedophilia.

This term refers to sexual activity with a prepubescent child (13 years old or younger); also, the

actor must be at least 16 years old, and at least 5 years older than the victim (APA, 2000). Some of these

perpetrators prefer females, and some prefer male victims—yet another subset prefer either- or-

genders. For those deviates that prefer females victims, their age preference usually falls between 8-10

years old; for those preferring male victims their victims are usually slightly older. Additionally, some of

these violators are attracted only to children and are referred to as the exclusive type, and those that

are also attracted to both adults and children are called nonexclusive types (APA, 2000).

Hebephilia.

4PORTRAIT OF A CYBER SEXUAL PREDATOR

A subtype of paraphilia/pedophile is known as the hebephile: it simply defines the male, or

female who desires are committing sexual acts against children— they prefer those that are pubescent.

Age begins near 14 years old, and is within adolescence age range (Frances, 2011).

Profile of an Online Sexual Predator

What is behind the thought process, and the method to their deviate madness? Consider the

following concepts:

1. They are looking to remain undetected by L.E. and remain anonymous.

2. The internet is used as his, or her outlet.

3. They are better at interacting with children than the child’s own parents at times.

4. They are people that may also have access offline to our children because of their

professions, or volunteer activities.

5. They lurk the internet chatrooms and are devoted to learning nonsexual topics like

sports, popular music etc. in order to spark a child’s interests, gain trust, and gain

control of the situation.

6. They know how to bond with children via clever conversations, until the child becomes

more open to talk to them in depth, thus leading to sexually activity eventually (FBI,

2011).

About an Offenders Childhood.

Approximately two thirds of convicted sexual offender polled in a British Prison state that they

were victimized by sexual abuse at least one time during their childhood. In yet a separate poll within

the United States—90% of those who had once been incarcerated for child sexual abuse, spoke about

maltreatment that occurred in their youth: this ranged anywhere from neglect to severe abuse.

Additionally, 70% of those that were incarcerated at the time of the study, report experiencing sexual

5PORTRAIT OF A CYBER SEXUAL PREDATOR

abuse as children. Furthermore—boys that were abused in this manner were more frequently abused by

female relatives, and were more likely to become abusers than those abused by male relatives, or

outside of the family relationships (Thomas, Phillips, Carlson, Shieh, Kirkwood, Cabage, & Worley ,2012).

In the proceeding list, there ideas of what have negative experiences in a child sex offender’s childhood, that have been reported by those that have been convicted:

Parental neglect Experienced, or witnessed physical violence Lack of material care Childhood attachments to parents were more secure with the mother than the father Reported distress in adulthood from childhood causing emotional focused coping

mechanisms (e.g. fantasy) Lower self esteem Loneliness In apt social skills Some were from two parent homes Some lost/never known one parent Some had neglectful-alcoholic parents Many experienced childhood trauma from abandonment, neglect, and emotional-

physical abuse Did not fit in school Longed for missed childhood

(Thomas et al.; 2012)

Who views Child Pornography?

Quayle (2011). States the following: “Internet sex offenses have accounted for roughly one third of all sex convictions”

As it is it commonly known, the use of pornography and its contender cyber porn –they are not

an uncommon entity as it regards child sexual abuse. Some use the internet to stalk, and capture images

of children—while some arrange secret meeting for abuse via the use of the internet. It all varies

depending on each criminal.

Here are some facts regarding the cyber perpetrators and his victims cited by Quayle (2011):

6PORTRAIT OF A CYBER SEXUAL PREDATOR

[T]hey “are more likely to offend in the company of a male and are highly likely to have

experiences both childhood and adulthood victimizations at the hands of men, and are likely to display

some profound disturbances in their ability to seek and maintain appropriate adult intimate

relationships…relationships, personal perception of men and boys are relatively immature, profoundly

disturbed, and inextricably linked to their offending behaviors (Quayle, 2011; p. 392).

Although males are vastly more likely to commit crimes in this arena—female actors perpetrate

on occasion. Lastly—in the subsequent data, presented will be more characterizes of the cyber

pornography perpetrator:

99% appear to be male The majority are Caucasian Over 60% showed being sexually stimulated by way of the penal erection after viewing

child pornography, opposed to other adults viewing child pornography. Child pornography offenders with any kind of prior criminal history were more likely to

commit a contact offense, or any kind of offense within two-two and a half years of beginning their cyber porn activity.

They Stick Together in Cyber-Space

Although the protection, of the actor’s freedom (that is why they remain anonymous) is their

secondary goal outside of their primary goal of trading, viewing, and bragging about their exploits with

children—these cyber criminals also tend to help each other out in various fashions (FBI, 2011).

Specifically, they give each other tips on how to trade, receive, retrieve, and behave online. Also, they

provide general support for one another in order to bolster the self-esteem of their deviate peers. They

share direct connections to others who prefer subtypes of child pornography (for instance, lovers of

boys). The following is an official, legitimate site that is dedicated to this particular interest for

pedophiles: NAMBLA [(North American Man/Boy Love Association)] (FBI, 2011).

7PORTRAIT OF A CYBER SEXUAL PREDATOR

In a proverbial nutshell—the internet profoundly exasperates the pattern by which the

pedophiles progress with their behaviors towards children. Before the internet connection to child porn,

it would have taken years for the evolution of the sexual predator to go through each stage: 1) viewing

child porn, 2) voyeurism of children in person, and 3) physical contact with a child. The vast amounts of

available data for a cyber actor are profound. There are chatrooms, and forums to help for each

variance in taste in victimizing children, and more child pornography available than can be stayed atop

of L.E. officials. Crime never sleeps, and this one is no exception. All of these avenues are steadily, and

readily available for the perpetrator 24 hours a days, and seven days a week. What was once the

evolution of a deviate, has now become an emerging pattern that is barely hampered—simply because

of the World Wide Web’s availability of anything desired by them. Their addiction is met, with just click

of the mouse, and a swipe, or a download of an application on their smart cell phones.

They Don’t Always Act Alone

“Last April a 10 year old girl was invited to a slumber party at the home of another little girl in

Greenfield, CA. What her parents didn’t know: the friend’s father Ronald Riva, was a member of the

Orchid Club, an online group of men who met in pedophile chatrooms that used the internet to swap

child pornography and true life stories of child molestations “(FBI, 2011; p1 ).

This unsuspecting child was molested by the home owner—a parent whose child invited her

over for innocent fun. Unfortunately, he did not act alone: one of his peers from the Orchid Club co-

committed this crime with him, as they sexually abused this young girl all while being live broadcasted

for other members of the club to witness while this was taking place.

Children Become Part of the Anonymity

8PORTRAIT OF A CYBER SEXUAL PREDATOR

Often after a child has been groomed by a cyber predator, before, during, or even after the

sexual molestations-- the child victim protects the anonymity of the perpetrator. There are secret

languages that may be used to do so:

PAW, or PRW= parents are watching

PIR= parents in room

POS= parents over shoulder

P911= parent emergency

(L)MIRL= lets meet in real life

The issue with children possibly keeping their perpetrators unidentified is because partly they

may feel ashamed, or embarrassed simply because they have experienced an interest in sexuality, or

even being a little curious about what was transpiring with them and the criminal; this is typically more

the case with teens (FBI, 2011). Sometimes within the act of engaging in this deviate-illicit

“relationship”, the child victim may turn off the computer when an adult approaches, or move the

screen in another direction in order to avoid detection of the goings on, or the criminal himself (FBI,

2011).

Cyber Stalking: a Method to Their Madness

“Stalking according to the US Department of Justice involves harassing, or threatening

behaviors that an individual engages in repeatedly, such as following a person, appearing at a

person’s home or place of business, making harassing phone calls, leaving written messages or

objects, or vandalizing a person’s property (Valdosta State University , 2015).

Phases of Stalking.

Obsession: stages of being enthralled with victim

9PORTRAIT OF A CYBER SEXUAL PREDATOR

Information Gathering: gets details about the victim from loved ones, coworkers, finds

out their usual where about etc.

Harassment: positively, or negatively interactions with their target, such a s verbal abuse

or threats for negative--the positive can consist of pursuing the target without any

encouragement

Violence: physical, and or sexual violence on the victim

Sending emails, illicit pictures of him or herself, gifts to the child, or even calling them via the

phone can all transpire without any encouragement on the child’s behalf or permission by the minor

whatsoever (Valdosta State University , 2015).

Subtypes of Cyber Stalking.

Email Cyber stalking: initiates relationship without ceasing or encouragement

Internet Cyber Stalking: used to visit victim in chatrooms, or adding spyware to track

their moves around the World Wide Web

Computer Cyber Stalking: may assume control of the targets computer through

hacking, DOS attacks etc. (Valdosta State University, 2015).

Addiction at It’s Worst

For the child cyber predator—child pornography is their go to tool, fixations, and their

addictions fix. They become immersed in a lifestyle of actively seeking out their prey, and going through

elaborate measures to conceal their freedoms and privacy to perpetrate their crimes. Cyber Sex

Offenders do not have one, or two victims—they always continue on until the day that they are

captured. Sometimes incarnation does not stop the criminal from seeking out, or even stalking children

online. It is a rare occurrence that they cease without help, warning, prison time. They often have

10PORTRAIT OF A CYBER SEXUAL PREDATOR

victims where the amounts fall into the double digits (10, 20, 30 etc.). Their goals, desires, thriving is

hinged upon catching their prey—which of course are under aged children, and sometimes infants are

used in for sexual pleasure. Age preferences range from criminal to criminal. Some do not care

regardless of gender, race, or age—but generally they do like certain age ranges over others.

Cyber pornography is rampart- therefore it is the quickest fix ever-however, and whatever the

criminal chooses. With one click, or download they meet their very maladjusted criminal needs at the

expense of a victim(s). This can be instantaneous, opposed to walking to the private section of an adult

bookstore and thumbing through the specified section. It’s there, and it protects anonymity. For the

cybercriminal they have both of what they need, access 24/7, and they get to protect their obscurity.

Child Molestations that have Transpired Offline because of Pornography

Were Rearrested for con-tact offense after 4 years Admitted to Contact

Sexual Offenses

6%

55%

Contact Sexual Offenses Because of Child Porn

Seto (n.d.)

donna demond, 12/08/15,
donna demond, 12/10/15,

11PORTRAIT OF A CYBER SEXUAL PREDATOR

Recidivism

Category 1 Category 2

Committ New Offenses After 3 years

Committ Contact Sexual Offenses After 3 years

5%

2%

RecedivismsOut of 9 Samples= 2630 offenders total

Column1 Column2 After 3 years

Axis Title

Axis

Title

Seto (n.d.).

12PORTRAIT OF A CYBER SEXUAL PREDATOR

Federal Child Pornography Offenders

*These Offenders as mentioned above are most unlikely to reoffend.

Seto (n.d.).

Category 1 Category 2 Category 3 Category 4

Employed Some Education Married or Previously Married No Prior Criminal Offenses

68%

58% 59%

53%

Characteristics of Those That view Childpornograhy:Poll done by The Federal Bureau of Prisons

Column1 Column2 Column3

13PORTRAIT OF A CYBER SEXUAL PREDATOR

References

American Psychiatric Association (2000). Paraphilias; Sexual Disorders; Pedophile; Diagnostic and Statistical Manual IV;

FBI (2011). Child Predators: The Online Threat Continues to Grow; Retrieved from http://www.fbi.gov.

Frances, A.J. (2011). DSM5 Tries to Sneak in Hebephilia; DSM in Distress; Retrieved from http://www.psychologytoday.com.

Hickey, T.J. (2008). Taking Sides: Clashing Views in Crime and Criminology; eighth edition; McGraw Hill; NY.

Quayle, E. (2011). Pedophile, Child Pornography, and Cyber Predators; c. 46; Routledge Handbook of Deviant Behavior; NY; Retrieved from httpp://www.google.com.

Thomas, S.P.; Phillips, K.; Carlson, K. ; Shieh, F.; Kirkwood, E. ; Cabage, L.; & Worley, L. (2012). Childhood Experiences of Perpetrators of Child Sexual Abuse; Perspective in Psychiatric Care; doi: 10.1111/j 1744-6163.2012.00349x.

Seta, M. (n.d.). Internet Facilitated Sexual Offending; c. 4; Sex Offenders Management and Planning; Initiative of Office of Justice Programs; Retrieved from http://www.smart.gov.

Valdosta State University (2015). Stalking and Cyber Stalking: Health Promotions; Retrieved from http://www.valdosta.edu.